We give a short routine which is based on a Feistel iteration and uses a large number of rounds to get security with simplicity.
CITATION STYLE
Wheeler, D. J., & Needham, R. M. (1995). Tea, a tiny encryption algorithm. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1008, pp. 363–366). Springer Verlag. https://doi.org/10.1007/3-540-60590-8_29
Mendeley helps you to discover research relevant for your work.